AWS Security

CloudTrail Automation you own this product

This free project is part of the liveProject series AWS Security: Audit and Intrusion Detection Automation
prerequisites
basic knowledge of *nix/bash command shell • basic knowledge of the Git version control system • basic hands-on experience with AWS CloudFormation • Intermediate knowledge of AWS accounts and AWS Organizations • Basic knowledge of IAM, AWS CloudTrail, and cross-account IAM permission mechanisms
skills learned
automate AWS CloudTrail configuration • develop automated tests and CI/CD CodeBuild pipelines • set up IDS GuardDuty • restrict access to resources with Organizations Service Control Policies
Eric Kascic
1 week · 8 hours per week · INTERMEDIATE
filed under

placing your order...

Don't refresh or navigate away from the page.
This free project is part of the liveProject series AWS Security: Audit and Intrusion Detection Automation explore series
Check your email for instructions on accessing CloudTrail Automation (liveProject)
continue shopping
adding to cart

Look inside

In this liveProject, you’ll bring visibility to customer AWS accounts using AWS CloudTrail, a vital tool that provides insight into all API actions invoked in consumer accounts. To achieve your objective, you’ll iteratively develop infrastructure as code in the form of AWS CloudFormation templates, then learn to address cross-account automation issues.

project author

Eric Kascic

Eric Kascic is a software developer with 25 years of professional experience. He has developed software solutions across a variety of business domains including telecommunications, medical imagery, and financial services. He has developed embedded, desktop, and server-side software, and has specialized in creating build, deployment, and test automation systems.

Since 2013, he has primarily focused on the AWS platform. At Stelligent, a boutique consulting firm that traditionally specialized in CI/CD, DevOps, and AWS automation, he developed CI/CD solutions for the AWS platforms of financial services companies. In developing infrastructure-as-code solutions, security was a primary focus. Eric invented the cfn_nag tool in 2016 to perform static analysis on CloudFormation templates to help customers prevent deploying unsecured AWS resources (such as those missing encryption or with overly permissive access).

He is currently a principal security engineer at a financial services company where he develops software to support security processes including automation of AWS IAM role creation, as well as a platform to detect and remediate insecure AWS resources across hundreds of accounts. Eric has published several articles relevant to security automation in AWS, including articles about cfn_nag, IAM, CloudFormation, and CI/CD.

prerequisites

This liveProject series is intended for security engineers with intermediate experience in AWS and infrastructure as code. You will need to be familiar with the following:


TOOLS
  • Basic knowledge of *nix/bash command shell, including pipes, redirection, command substitution
  • Basic knowledge of the Git version control system
  • Basic hands-on experience with AWS CloudFormation
  • Basic hands-on experience with the AWS CLI
  • Intermediate knowledge of AWS accounts and AWS Organizations
  • Basic knowledge of IAM, AWS CloudTrail, and assuming cross-account IAM roles
TECHNIQUES
  • Intermediate understanding of cloud computing and the AWS platform
  • Basic understanding of “infrastructure as code”
  • Basic understanding of security concepts

Note: For all milestones in this project beware that it costs money to deploy AWS resources and leave them running. The costs depend upon the type of resource.

you will learn

In this liveProject, you’ll develop “infrastructure as code” in the form of AWS CloudFormation templates to achieve the objective of automation to handle the scale and complexity that today’s systems demand. You will develop the “code” iteratively and learn to address cross-account automation issues.


  • Automate AWS CloudTrail configuration
  • Develop automated tests and CI/CD CodeBuild pipelines
  • Set up IDS GuardDuty
  • Restrict access to resources with organization service control policies
  • Search AWS CloudTrail events through CloudWatch Logs
  • Develop infrastructure as code with AWS CloudFormation templates

features

Self-paced
You choose the schedule and decide how much time to invest as you build your project.
Project roadmap
Each project is divided into several achievable steps.
Get Help
While within the liveProject platform, get help from other participants.
Compare with others
For each step, compare your deliverable to the solutions by the author and other participants.
RECENTLY VIEWED